SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Building Scalable Cisco Internetworks (BSCI)
                                             642-901
                                           Study Guide
                                            Rob McCarty
                                              12/12/07




Contents:
Routing Protocols

-EIGRP                              Pages 2-6
-OSPF                               Pages 7-11
-IS-IS                              Pages 12-15
-BGP                                Pages 16-x

Advanced Routing Topics

-Multicast                          Pages x-x
-Route Manipulation                 Pages x-x
-IPv6                               Pages x-x
-DHCP Services                      Pages x-x




Before you read:


This guide was created with the intention to help with the Cisco exam BSCI 642-901. This is just a
quick reference, cram style study guide. It is not designed to teach the foundation topics required to
pass the exam, rather a guide to help remember specific topics. I suggest reading the Cisco Press books
associated with the exam before going through this guide, as well as getting as much hands on practice
with the Cisco IOS if you want to be successful.

This guide also assumes the reader has CCNA level knowledge to understand many of the terms used.
Routing Protocols


                                                 EIGRP
Overview

-Developed by Cisco, and will only work with Cisco devices
-Considered a “Hybrid” between Link-state, and Distance vector routing protocols
-Uses backup routes called a feasible successor
-Uses the DUAL algorithm to calculate routes
-Has 3 tables: Neighbor, Routing, and Topology.
-Classless Routing, supports VLSM
-Supports multiple routed protocols ex. IPX, Appletalk, IP


Terminology

Successor: The best route, or primary route, to a network. It has the lowest FD
Feasible Successor: The backup route to a successor.
Feasible Distance (FD): The total distance to the destination network, including the AD
Advertised Distance (AD): The distance from the next-hop router, and the destination network
Active Route: Route is undergoing computation, due to a change ex. Its down.
Passive Route: Operational route
Neighbor table: List of directly connected routers
Routing table: The best routes to networks. List of successors and feasible successors
Topology table: A list of neighbors' routing tables.
DUAL: The algorithm that decides what routes to use
Reliable transport protocol (RTP): Ensures EIGRP packets reliability


EIGRP Metric

The metric is the bases for how the Successor is chosen. The lower the metric, the better the path to
that network is. It is a complex calculation that can be based on:

Bandwidth – The speed of the line
Delay – The time it takes for a packet to cross the line
Reliability – Uptime of a line
Loading – The load on the line
MTU – Maximum Transmission Unit

Although all of these can be configured, by default, only Bandwidth and Delay are used to calculate the
metric. These options are referred to as K values in the IOS.

*Note* If a metric option is configured on one router, but not another, they will NOT become
neighbors
EIGRP packets

Hello: Creates relationship with neighbors

Update: Update/send routing tables to neighbors

Query: Queries for available routes/paths to networks

Reply: Reply to a query

ACK: The RTP response to ensure the packet was received. Used for everything BUT Hello packets.



EIGRP Show Commands

show ip eigrp neighbors: Displays the neighbor table

-H (handle): Lists each neighbor in order of discovery
-Address: The layer 3 address of the neighbor ex. IP address.
-Interface: The int that the neighbor is connected through
-Hold Time: The maximum time without hearing a Hello packet before this link is considered “dead”.
The default is 15 seconds, or 3 hello packets.
-Smooth Round Trip Timer (SRTT): The average time for the router to send a hello packet, and
receive an ACK back.

show ip eigrp topology: Displays routes with their associated successors and fiesable successors (if
applicable), along with the FD to each. Also displayed here, are if any routes are in an active or passive
state.

show ip route: Displays the routing table, along with how each route has been learned.

show ip eirgp interfaces: Displays specific information for each interface that is configured for EIGRP

Peers: Number of directly connected neighbors
Pacing Time: Used to determine when eigrp packets should be sent on this interface.
Pending routes: Number of routers in the packets that are waiting to be sent

show ip eigrp traffic: Displays the number of EIGRP packets that have been sent/recv. ex. The
number of hello packets send/recv.
Load Balancing

By default, EIGRP will load balance across up to 4 equal paths to the same network. Paths are
considered equal, when they have the exact same metric.

You can however, load balance over multiple paths even if they do not have equal metrics. The
command to do this is called variance, and is run from the EIGRP configuration prompt.

ex. hostname<config-router>#variance 3

The number after the variance command is a value between 1-128, with 1 being default. This number
defines how much of a variance there can be from the metric of the successor, by a multiple of what
ever the number is.

ex. a variance of 3 means that there can be up to 3 times the metric to still be used for load balancing.
If the successor's metric is 500, then it will use any routes with up to 1500 as a metric as well.


EIGRP Default Route

A default route is a route that a router sends packets to, that it does not have a route for in its routing
table for. ex. Addresses on the Internet. In the IOS is is referred to the gateway of last resort.

Configure by setting a static route to 0.0.0.0 via 0.0.0.0 on the interface you want it to go out of.
ex. ip route 0.0.0.0 0.0.0.0 eth0/0

If you then want to advertise this route to other routers to use via EIGRP, configure the network for it
on the AS number you are using.
ex. router eigrp 1
        network 0.0.0.0

This would allow other routers use int eth0/0 on this router, as a default gateway.

You can also configure a default route on an existing route by the ip default-network command.
ex. ip default-network 192.168.0.1

This will set the current route to 192.168.0.1 as the gateway of last resort/default route.


Route Summarization

By default, EIGRP has the command auto-summary enabled. This causes the protocol to become
classfull, and does not transmit the subnet masks along with routing updates (it assumes default masks).
To turn off auto-summary so that you can use more specific and efficient summarization, simply enter
the no auto-summary command from the EIGRP configuration prompt.

You will then be able to configure specific summary routes.
ex. ip summary-address eigrp 1 192.168.0.1 255.255.255.240
EIGRP Authentication

As a way to protect the network there is the option to have EIGRP communication authenticated. It
uses MD5 hashing to encrypt a key-chain of keys which are used in the domain. Each key will have a
“lifetime” on it, which is how long the route will use that key. This way you can set 1 key to expire,
and have it automatically start using another afterwards. You can have the keys overlap, to ensure no
problems between routers when changing keys.

To configure:

key chain Key_Chain1 where Key_Chain1 is whatever name you want to call the key chain.
This takes you into the configuration of that key chain.
key 1 where 1 is the number of whatever key you want to configure.
key-string defines what the 'password' will be for this key

There are now 2 commands to run, to set how often the keys will be used.
accept-lifetime is the timeframe that this router will accept this key as valid
send-lifetime is the timeframe that this router will use this key and send to others routers.
These values are set by setting the time-to-start (hh:mm:ss, day, MONTH) and the duration, or a
specific time to stop.

Now to actually turn on authentication, you go into the interface configuration of whatever link you
want to run it. You do not need to run authentication on every link. Under the interface type:

ip authentication mode eigrp 1 md5 where 1 is the AS number

Once it is on, you need to apply the key-chain to be used

ip authentication key-chain eigrp 1 Key_Chain1 where 1 is the AS and Key_Chain1 is the name of the
key chain.

*note: If a router receives communication on a link from another EIGRP router and does not have the
correct authentication, it is immediately taken out of the routing table.


STUB Zones

A stub is a router that does not go anywhere, meaning it is not asked about routes because it has already
told its neighbors that it has nothing else. Although not unique to EIGRP, stubs help cut down on
queries within a network.

ex. A link goes down on a router that is also connected to 5 other routers. It will then query those 5
routers for a backup path, and if those routers do not have a route, will then pass the query on and on
until it finds one, or it timesout. If those 5 routers were configured as stubs, the router that lost the link
would not even ask them, as it already knows they are stubs and have no other routes.

From the EIGRP configuration prompt, use the eigrp stub command, followed by what you want to
advertise.
ex. eigrp stub static. This would advertise all/only static routes.
EIGRP Notes

-224.0.0.10 is the multicast address that EIGRP uses.
-Hello packets are NOT sent reliably, meaning there is no ACK message when they are received.
-The metric calculation is ...
-The administrative distance for Internal EIGRP is 90 and for External EIGRP 170
-A K-Value mismatch means the options being used to calculated the metric differs between connected
routers, and they will not become neighbors because of it.
-A graceful shutdown is when an interface shutdown (either administratively or due to a reload),
EIGRP will send out a final hello message with k-values of 255 to tell other routers that is it being
taken down. Also called a goodbye message.
OSPF


Overview

-Link state protocol
-Uses Dijkstra's SPF algorithm
-Only sends routing updates when there are changes*
-Very resource intensive compared to other protocols

Terminology

-Neighbor Table: List of directly connected routers
-Routing Table: The current best routes to networks
-Topology Table: A complete database of all possible routes in an area
-Area Border Router (ABR): A router that connects 2 areas together, and knows about both
topologies
-Autonomous System Boundary Router (ASBR): Connects an area to a network, outside of your AS
ex A network like the Internet. Also connects to a network running a different routing protcol.
-Router ID (RID): an identifying name used by OSPF.
-Internal Router: I router that has all interfaces in one area
-Backbone Router: A router in the backbone area A.
-NBMA: Non-Broadcast-Multi-Access. ex. Frame Relay


Areas

All areas must connect back to area 0, which is considered the backbone area. Because of this, on
ABRs, one of the interfaces must ALWAYS be in area 0.

The topology table is shared and is the same between all routers in an area. ABRs, will have routes
from both areas.


Router ID

Based on the highest IP address that is active when OSPF starts on a router. However, a loopback
interface will take priority over a physical, regardless of whether it is higher or not.
ex.
int e0/0 is 192.168.1.1
int e0/1 is 192.168.1.2
192.168.1.2 becomes the RID
If you configured a loopback with the address of 1.1.1.1, then the RID would be 1.1.1.1 next time
OSPF started.

The command router-id, overrides all ip address and becomes the RID.
ex. <config>#router-id 2.2.2.2
Show Commands

show ip ospf – Displays OSPF related information, including area types
show ip ospf database – Displays details of LSAs
show ip ospf neighbor – Displays Neighbor table
show ip route – Displays routing table

When looking at the routing table, OSPF routes have 4 different tags
O – an intra-area route learned by OSPF
O IA – an inter-area router learned by OSPF
E1 – An external route.
E2 – An external route.

The difference between E1 and E2, is that E1 is the combined costs of all hops to get to that external
router, whereas E2 is just the cost the ASBR gave that route, regardless of the cost to get to that ASBR.
This is the default and should be left as unless there are multiple ASBRs to get to an external network.

Summarization

Route summarization can only be done on an ABR between areas, thus careful planning needs to be
done to ensure IP address contiguousness. Route Summarization blocks specific route LSAs from
entering the backbone and propagating to all areas. Two types of summarization can be done:

Interarea route summarization – When an ABR summarizes routes in an area
External router summarization – Summarizations of routers injected in OSPF via redistribution.
Usually done on ASBRs.

To configure interarea summarization from the OSPF configuration:
area 1 range 10.1.2.0 255.255.255.0 100, where 1 is the area ID, and 100 is the cost (optional)

To configure external summarization on an ASBR from the OSPF configuration:
summary-address 10.1.2.0 255.255.255.0 word, where word is a tag (optional) for us with route-maps.
Neighbor Communication and Packet types

Hello packets – Sent to all routers on the area. Contains neighbor table.
Database description (DBD) – Brief description of the topology, used to communicate what routes
have been learned.
Link-state request (LSR) – A request for an LSA of a route
Link-state update (LSU) – Packet that contains the LSA(s).
Link-state advertisement (LSA) -
-Type 1/Router LSA
       -A route that is flooded to all routers in an area
-Type 2/Network LSA
       -Advertises a network in an area
-Type 3/Summary LSA
       -Routers to another area. Type 1 LSAs and turned in Type 3 by ABRs
-Type 4/Summery LSA
       -Like type 3, but involve ASBRs
-Type 5/External LSA
       -An advertisement of another AS by an ASBR
-Type 7
       -Use in NSSA to pass LSAs from external networks

Link-state acknowledgment (LSACK) – Acknowledgment message that ensures reliability of updates
Neighbor process


OSPF Metric/Costs

OSPF makes its routing decisions based on the cost of routes. The lower the cost, the better, or faster,
the route.

Cost = 100 / Bandwidth in Mbps

ex.
FE 100Mbs = 1
Ethernet 10Mbps = 10
T1 1.544 = 65
56k = 1785

However, by default, because there cannot be a fraction of a cost, anything over 100mbps, would also
get a cost of 1, no matter the speed.

There are two ways to change the default costs.

First, you can just manually specify what you want the cost to be. To do this, use the command
ip ospf cost on an interface

Or, you can change how the cost is calculated so that it adjusts to the bandwidth more accurately.
Under the OSPF configuration, use auto-cost reference-bandwidth 100 , where 100 is the metric you
want to use in Mbs (100 being default)
DRs and BDRs

Anytime there is a shared segment, there will be a DR and a BDR. P2P connections however, do not
elect or need this. All other routers on the segment, will be tagged as DR-Other

All updates that are needed to be sent out on that segment, will be sent out by the DR.

The DR and BDR are elected based on the router priority that is sent in the hello packet. Since by
default all the router priorities are set to 1, the tie break is the higher RID.

You can change the router priority, to ensure a router becomes a DR or BDR, use the command router-
priority
ex. <config>#router-priority 2. If all other routers were left as 1, this would become the DR. You can
set the priority to 0 if you would like to disable the router from ever becoming DR/BDR

Authentication

Two types of authentication are supported in OSPF. Simple password (plain text), and MD5
authentication. Passwords are inserted into the header of OSPF packets, and neighbors must share the
same passwords on the interface in which they are connected. To configure authentication from the
interface config:

ip ospf authentication-key word, where word is the password you want to use, or for an MD5 key, use
ip ospf message-digest-key 100 md5 word, where 100 is the key-id, and word is the password.
ip ospf authentication for simple password, or ip ospf authentication message-digest for MD5
encryption of the password.


Default Route

OSPF routers do not, by default, generate a default route. To configure:
default-information originate always. If there is already a default-route in the routing table, this will
tell this router to advertise it to others. If there is not already a default-route, the always (optional)
option at the end forces it to advertise the 0.0.0.0 anyway.

NBMA Types and Configurations

Broadcast, multi-access networks:
Ex. Ethernet.
Single operation mode. Uses DR/BDR and 10 second hello intervals

Point-to-Point networks:
Ex. ISDN
Single operation mode. No DR/BDR and 10 second hello intervals.

Non-Broadcast, Multi-Access (NBMA) networks:
Ex. Frame Relay
Five operation modes.
Virtual Links and Configurations

Virtual links are used to connect areas to the backbone, through other areas, without actually sharing an
ABR with area 0. You can also use it to connect discontinuous area 0s in an AS. However, this should
only be considered a temporary solution, and not part of the design. To configure:

area 1 virtual-link 2.2.2.2, where 2.2.2.2 is the router ID of the remote router you want to neighbor
with.


Stub, Totally Stubby Areas and Not-So-Stubby-Areas

Stub area – The ABR does not forward external routes into this area. In routers need to reach external
networks, they use default routes.

Totally Stubby area – This area does not accept external routes, or summary routers from other areas.

NSSA – A stub area that allows routes to still come in under LSA type 7. This areas can also have
ASBRs.

Stub and Totally stub areas should have only 1 exit, or only 1 default route to exit. All routers within
an area must be configured as stub routers before they will become neighbors.

To configure stub areas, #######


Notes

*updates are still sent every 30mins to neighbors, to ensure convergence.
LSAs on virtual links do not age, and will not be refreshed every 30mins
IS-IS


Overview

-A router is referred to as an intermediate system, or an IS.
-Is a Link-State Routing protocol
-Uses SPF algorithm
-Originally created to be used with the OSI protocol
-Integrated IS-IS was created to support TCP/IP
-Integrated IS-IS still requires and OSI address, which is now called a CLNS, which acts as the layer 3
protocol for IS-IS.


Terminology

Connectionless Network Services (CLNS): The OSI address used by IS-IS
L1 Router: Only knows of networks in their own area
L2 Router: Only knows of routes on the backbone.
Network Service Access Points (NSAP): The CLNS address that is applied to a router.
NSAP Selector (NSEL): When this is set to 0, the SNAP is called a NET
Network Entity Title (NET): Used to identify an OSI host in a domain
PDU
LSP


IS-IS Routing

There are 3 types of routers. L1, L1/L2, and L2. Areas connect to each other via links instead of
ABRs. However, L2 routers must be contiguous throughout the network, and have a physical path
through each area.

Because IS-IS runs through CLNS, it is less resource intensive than OSPF. Fewer updates are sent, and
there are much fewer update types to be sent.

Metrics

The default on all connections, is a metric of 10, regardless of the connection type or speed. To make
IS-IS more efficient, you can configure the metric on a link:

isis metric 30 level-2, where 30 is the new metric value, and level-2 is the interface types to apply to.

The metric can be set to anything from 1 to 63
CLNS addresses

Unlike IP, CLNS can apply to an entire router, as opposed to a specific interface. IS-IS requires CLNS
addressing on all nodes for them to discover each other.

CLNS addresses that are used by routers are call NSAPs. NSAP addresses contain the OSI address,
and a link to the higher-layer process. It is the equivalent of the IP address and TCP.

The NSAP address is broken down into 3 parts; the area address, the system ID (6 bytes), and the
NSEL (1 byte), with a maximum of 20 bytes total.

The first part of an NSAP address is AFI. If this is set to 49, it means that the address is for internal use
(private). An example of an address:

49.0004.0000.0c4b.7b3c.00, where 49 is to specify its private, 0004 is the area ID, system ID is the
MAC address, and the NSEL set to 0, making it a NET address..

The area address is associated with the IS-IS routing process. All routers in an area must be set the
same, and is what defines an area, and is what is used in L2 routing. L1 routers only see routers with
the same area address.

The system ID must be unique within an area. Usually use the MAC address, but anything 6-bytes
long is possible. L1 routing is based on this ID, and must be unique.


Route leaking

Because L2 and L1 computations are separate, it is possible to have asymmetric routing. Meaning the
path a packet takes to reach a destination, may take a different path on the way back, due to L2 and L1
routers seeing different paths to take.

Route leaking is like redistribution, where the L2 routers share some interarea routes with L1 routers.


IS-IS packets

OSI recognizes a frame as a data-link PDU, and a packet as a network PDU. The 4 other types of
PDUs are:

Hello PDU (ESH, ISH, IIH) – use to establish and maintain adjacencies.
LSP – Used to distribute link-state information
PSNP – Used to ACK or request missing link-state information
CSNP – Used to describe an entire LSDB

L1 and L2 information is distributed in separate LSPs. LSPs in a broadcast network are sent out as
multicast, and as unicast on P-t-P networks.

The default interval on Hello packets (IIH) is 10 seconds. The dead timer is still 3 times the hello
timers
Network types

IS-IS only works in with broadcast networks, or Point to Point. It does not know about NBMA
networks, and it is recommended to use point-to-point over NBMA clouds. IS-IS assumes that LANs
and WANs are in a full mesh state, and broadcasting can be achieved.


LSDB synchronization

When an LSP is received, it is then flooded to all neighbors except the one it came from. L1 LSPs in
their local areas, and L2 LSPs through the backbone. A sequence number is used to ensure only current
updates are listened to.

Adjacent routers exchange CSNPs to compare their LSDB, and are used to determine whether their
LSDBs are synchronized. PSNPs are used to acknowledge receipt of LSPs and to request anything
missing.


Configuring IS-IS

To enable IS-IS on a router:
router isis 10, where 10 is the area-tag. The area-tag is not like an area ID from OSPF, rather it is more
like the process-id. If it is omitted, the IOS assumes 0 in its place.

To set a NET for a router once IS-IS has been enabled:
net 49.0004.0000.0a2c.93bc.00

To set the router type:
is-type level-1 or level-1-2 or level-2-only. It not set, the default is a L1/L2 router.

Once you have set these two things, you then need to go into the interface you want IP routing:
ip router isis 10, where 10 is the area-tag.

To change the router type on a per-interface basis:
isis circuit-type level-1 or level-1-2 or level-2-only.


Show commands

show clns – displays general info about CLNS network
show clns 10 protocol – specific info on an area, where 10 is the area tag.
show isis 10 route - displays L1 routing table, where 10 is the area tag.
show clns route – displays L2 routing table
show isis 10 database – displays the LSDB
show isis 10 topology – displays L1 and L2 topology tables
Summarization

To configure route summarization from the router config:
summary-address 192.168.1.2 255.255.255.0 level-1-2
BGP


Overview

A routing protocol designed for the internet to connected AS.
An InterDomain Routing Protocol (IDRP).
The routing table on a core internet BGP router can be more than 200,000 routes.
Considered a 'path vector' type of protocol
Because BGP is so scalable, it has very slow convergence time.
Uses TCP for reliability

Terminology

Interior Gateway Protocol (IGP):
External Gateway Protocol (EGP):
Autonomous System (AS):
External BGP: When BGP is running between routers in different AS
Internal BGP: When BGP is running between routers in the same AS
Peer Group: A group of neighbors configured to have the same update policies.


Multihoming

Multihoming is when an AS has more than one connection to the Internet. This could be for reliability,
or for performance reasons. BGP helps in preventing routing loops, as well as being able to configure
which links to use, and when. There are 3 ways to accomplish this

-Each ISP passes only a default route to the internal routers.
Path manipulation cannot be done by the AS, as the ISP controls what default route is used.

-Eash ISP passes only a default route and ISP specific routes
This allows more optimal routing decisions to be made, and allow routers to router through better paths
(if they exist) to specific networks.

-Each ISP passes all routes to the AS
Although resource intensive, this all allows the best routes to be chosen to any network.


BGP synchronization

BGP synchronization is disabled by default. With synchronization on, BGP routers in a transit path do
not use or advertise routers to external AS, thus it is unnecessary to turn it on. Redistribution from
BGP into an IGP is not scalable due to the size of some BGP tables, thus most networks will run full-
mesh IBGP networks.
Packet types

Once TCP is established between 2 peers, each side sends an open message. A keepalive is sent in
reply if the open is acceptable. Once this has happened, updates and notifications can be exchanged.

Open message - Includes the version of BGP running, AS number, hold time, BGP router ID (which is
chosen the same way as OSPF), and any optional options.

Keepalives – A simple message header to keep the hold timer from expiring.

Updates – Updates only one path at a time. May also include withdrawn routes, path attributes, and a
list of IP address prefixes that can be reached by this route.

Notifications – Sent when BGP routers detect an error on a route.


Neighbors

Also known as peers. BGP routers do not form relationships with all routers, rather a select few in
which it exchanges updates with. Peers can be either internal, or external of the AS. Peers are
configured manual, and do no discover each other automatically.

There are 6 states for a neighbor to be in:

Idle
Connect
Active
Open Sent
Open Confirm
Established

Only when routers are in an established state, will updates, keepalives and notification messages
exchanged.


Attributes

Attributes are what the routing decisions are based on, like a metric. An attribute can be:

well-known mandatory
-AS-path, type code 2.
A list of AS numbers that a route has traversed through.

-Next hop, type code 3
The next hop IP address to get to a destination.

-Origin, type code 1
Describes where the route came from. Can be one of 3 options: IGP, EGP, or incomplete(unknown)
well-known discretionary
-Local preference, type code 5
Indicates which path is preferred to exit an AS.

-Atomic aggregate
type code 6

optional transitive (partial)
-Aggregator
type code 7

-Community, type code 8
A way of tagging routes for filtering/maps

optional non-transitive
-Multiexit-discriminator (MED), type code 4
Also called the metric, indicated to external neighbors the preferred path into the AS

Well-known – all BGP implementations must recognizes and propagate. Mandatory must appear in
updates, and discretionary does not.

Optional – BGP routers might propagate the attributes. Transitive routers will pass the attributes on as
partial, and non-transitive will delete the attribute.

Weight – A cisco specific attribute that applies only to the local router. Routes with a higher weight are
preferred.


Route Selection

Multiple paths may exist to a network, and they are all kept in the BGP table. However, BGP select
only one path to get to a network, which goes into the routing table. The decision is based on the
attributes set. BGP does not consider routers with AS loops, or unreachable next-hops.

Configuration of BGP

To enable BGP on a router, use
router bgp 65100, where 65100 is the AS. You can only have 1 AS on a router.

To activate a session with a BGP neighbor use:
neighbor 192.168.0.2 remote-as 65101, where the IP is the address of the neighbor

To create a peer group, use the command
neighbor group1 peer-group, where group1 is the name of the group.
neighbor 192.168.0.2 peer-group group1, with the IP address of the neighbor to add to a group

To use a loopback address when configuring a neighbor, use update-source option:
neighbor 1.1.1.1 update-source loopback 1, where 1 is the interface-number
IP Multicast




Overview

Networks can be more efficient by sending the same information once, to multiple nodes
Use Class D addresses
Most applications will use UDP


Terminology

IGMP
CGMP
PIM
RP
RPF


Multicast IP and MAC addresses

Multicast addresses are in the class D range, 224.0.0.0 to 239.255.255.255. Some common local scope
IP addresses reserved by IANA

224.0.0.1 – All hosts
224.0.0.2 – Al multicast routers
224.0.0.5 – All OSPF routers
224.0.0.6 – OSPF DRs.
224.0.0.9 – RIPv2 routers
224.0.0.10 – All EIGRP routers

In layer 2 environments, the IANA has reserved a block of MAC addresses starting with 01:00:5E to be
marked as multicasts.


IGMP

Used between hosts and their local router to join multicast groups, so that the router knows to forward
multicasts to the them. IGMP snooping is a way to prevent multicast flooding on layer 2 switches,
since they cannot see the IP address of hosts that have joined the multicast.
The current version is IGMPv3. It allows for hosts to request access to multicast sessions, as well as
send out leave-group messages to stop the router from sending the session. V3 also adds the ability to
filter multicasts based on the source so that hosts can have control over what is received.

By default, layer 2 switches flood IGMP groups. One solution is to manually add multicast mac
addresses, but this is not scalable.

IGMP snooping is a way for switches to listen to all IGMP packets, and update their tables respectively,
essentially becoming Layer 3 aware. This can be resource intensive.


CGMP

Cisco proprietary protocol that runs between a router and a switch. When a host joins IGMP group,
the router creates a CGMP packet with the mac address of the client that requested for the switch, so
that the switch can forward the traffic appropriately. The multicast mac address that the switches
listens on is 0x0100.0cdd.dddd.


PIM routing

PIM is independent of the routing protocol and uses its own routing table, but gets its information for it
via the unicast routing protocol running. Multi-cast routers use PIM to dynamically creates distribution
trees to determine the path of multicast traffic. There are 2 types of these trees.

Source Tree – Direct paths to each multcicast group from the source.

Shared Tree – A single tree shared by all routers. I has a single common root called an RP which all
sources forward to.

Multicast routing also uses Reverse Path Forwarding, which does not send a packet to a receiver, but
instead sends the packet away from the source.

There are 2 modes that PIM can be in:

Sparse mode (PIM-SM) – Uses a 'pull' model to send traffic. Uses the shared tree. Sources register
with the RP

Dense mode (PIM-DM) – Uses a 'push' model to flood traffic. Uses the source tree. Routers that do
not want the multicasts, send requests to the source to prune them from the tree.

There can also be the option of PIM sparse-dense mode that is a hybrid of the two, that allows for both
groups concurrently. Cisco recommends this option to always be used.
Configuration

To enable multicast routing on a router, use
ip multicast-routing command

To enable a mode, from an interface:
ip pim sparse-mode or ip pim-sparse-dense mode.

To set the router to be the RP:
ip pim send-rp-announce ethernet 0/1 scope 3 group-list 101, where ethernet 0/1 is the interface to run
on, 3 is the TTL maximum hops to announce to, and 101 is the access-list of hosts to send to. The
announcements are sent on the 224.0.1.39 address.

To manually listen on interface to a multicast group:
ip igmp join-group 224.0.0.55, with the IP of the group to listen on.

To join an interface to a group so that it automatically forwards those packets:
ip igmp static-group 224.0.0.55


Show commands

show ip mroute – displays the IP multicast routing table

show ip pim interface – displays information about routers configured for PIM

show ip pim neighbor – displays discovered PIM neighbors

show ip pim rp – displays RP information

show ip rpf – displays RPF information for the RP

show ip igmp interface – displays multicast information for that interface

show ip igmp groups – displays the multicast groups this router is part of
IPv6



Overview

-A new form of Internet Protocol, designed to replace IPv4 (current)
-No broadcasting/boardcast address
-IPsec standard on all communication
-around 300,000,000,000,000,000,000,000,000,000,000,000,000 available addresses


Formatting

IPv6 addresses are 128bits long. The are broken up into 8 groups, of 4 hex characters each.

ex. 2001:0002:0349:0000:0000:0000:0A56B:98AA

To make them shorter, and more manageable, two things are allowed.

First, any groups of consecutive zeros, can be dropped once, and replaced with ::

ex: 2001:0002:0349::0A56B:98AA

Second, any leading zeros on any groups, can be omitted

ex: 2001:2:349::A56B:98AA


Types of Communications

Unicast: Same as IPv4, sent to one host.
Multicast: Sent to many hosts listening to a multicast address, and replaces broadcasts.
Anycast: Sent to the closest host

All devices will usually have more than one IP address. The types of addresses are :

Link-Local: Layer 2 domain. ex. Like a local segment

This address is assigned automatically without DHCP, a lot like the 169.254.x.x address in IPv4. It is
used to locally communicate with other devices on the segment, without needing a DHCP or assigned
addresses. Every device will always at least have this.
All link-local address will start with FE80. The first 10 bits, will always be 1111 1110 10, followed by
54 bits of zeros. This way you can look at an address, and know right away that it is link local

The last 64 bits of the address, will be the MAC address of the device, with FFFE in the middle.

ex. If the mac address was 0012:21D5:012E, the link-local address will be

FE80:0000:0000:0000:0012:21FF:FED5:012E or FE80::12:21FF:FED5:12E short-formed.


Unique: Organization wide addressing

Used within an organization to define network boundaries, or domains. They can be compared to the
private IP addressing of IPv4 (10.x.x.x, 172.16.x.x etc)

The first 8 bits in a Unique address, are 1111 1101, which equals FD.

The next 40 bits represent your global ID, which is your organization's ID. This is unique per
organization, and is assigned to all devices within.

The next 16 bits will be the subnet ID

The last 64 bits will be the interface ID. This can be manually assigned, or automatically by a DHCP

Global: Internet address

This will be the address that lets you route on the Internet. You can still use a NAT with a unique
address internally, but Internet routers will route by the Global address.

The first 3 bits must be set to 001, making all addresses start with 2. The next 45 bits or less, will
comprise the Global Routing Prefix. The internet is expected to use addresses starting with 2001::

The next 64 bits (less what ever the global used), will be the subnet ID, to narrow down the location of
the route.

The last 64 bits, will be the interface address.




Multicast Addresses

First 8 bits are set to 1111 1111, which means they start with FF

The next 4 bits, are called the FLAG. This is used to set some basic options, like whether the address
is permanent (RFC defined) or temporary (something you create).

The next 4 bits define the scope. This specifies how far this multicast goes. The options are
1 – Interface (loopback)
2 – Link
3 - Subnet
4 - Admin
5 - Site
8 - Organization
E – Global (internet)

The last 112 bits are the address. This can be set to whatever you want, as long as they are not already
assigned to something else.

Some of the already assigned addresses are as follows:

FF02::1 - All nodes on the link (pretty much a broadcast)
FF02::2 - All routers on the link
FF02::9 - All RIP routers on the link
FF05::101 - All NTP servers in the site
FF02::1:FFxx:xxxx - “arp” msg to all nodes on the link, where the last 6 digits match the x's.
ex. FF02::1:FF00:28FD would be a way to find the layer 2 address of a system that ends in 00:28FD.
DHCP Services

Overview

Used to provide clients with IP addresses dynamically


Terminology

bootp
DHCP binding


Configuration

DHCP service and relay agent are enabled by default. To turn them on use
service dhcp command

To specify a database to store DHCP bindings:
ip dhcp database server1

To disable conflict logging
no ip dhcp conflict logging

To specify an exclude list
ip dhcp exclude-address 192.168.0.1 192.168.0.10

To create the DHCP pool to be used and enter specific DHCP config:
ip dhcp pool mypool
To specify the range to be used
network 192.168.1.0 255.255.255.0
dns-server 192.168.0.2 /24 to specify DNS
default-router 192.168.0.1 /24 to specify a gateway


Relay agent

A relay agent relays DHCP requests across domains. Because DHCP requests are broadcasts, this
needs to be on in order to reach a DHCP server through a router.

In order for a relay agent to work, the ip helper-address needs to be assigned to an interface. This
changes the broadcasts into a unicasts and forwards them to the correct server.
Show commands

show ip dhcp database – displays recent activity in the database
show ip dhcp binding – displays a list of bindings
show ip dhcp conflict – displays any address conflicts
clear ip dhcp binding – clears bindings

Mais conteúdo relacionado

Mais procurados

Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2Febrian ‎
 
Eigrp frequently asked questions
Eigrp frequently asked questionsEigrp frequently asked questions
Eigrp frequently asked questionsIT Tech
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1Febrian ‎
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
Eigrp and ospf comparison
Eigrp and ospf comparisonEigrp and ospf comparison
Eigrp and ospf comparisonDeepak Raj
 
EIGRP interview questions and answers part 2
EIGRP interview questions and answers part 2EIGRP interview questions and answers part 2
EIGRP interview questions and answers part 2NetworKingStudy
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree ProtocolAtakan ATAK
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLNutan Singh
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
 

Mais procurados (20)

Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
 
Eigrp frequently asked questions
Eigrp frequently asked questionsEigrp frequently asked questions
Eigrp frequently asked questions
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
CCIE Lab - IGP Routing
CCIE Lab -  IGP Routing  CCIE Lab -  IGP Routing
CCIE Lab - IGP Routing
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Ospf
OspfOspf
Ospf
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Eigrp and ospf comparison
Eigrp and ospf comparisonEigrp and ospf comparison
Eigrp and ospf comparison
 
IP Routing
IP RoutingIP Routing
IP Routing
 
BGP
BGP BGP
BGP
 
EIGRP interview questions and answers part 2
EIGRP interview questions and answers part 2EIGRP interview questions and answers part 2
EIGRP interview questions and answers part 2
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
 
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOLEnhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
 

Semelhante a Building Scalable Cisco Internetworks (Bsci)

Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)CCNAResources
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)Netwax Lab
 
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdftthind
 
Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationIT Tech
 
Packet Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPFPacket Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPFRafat Khandaker
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solutionArnold Derrick Kinney
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing projectvishal sharma
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopediaEnhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopediaHoàng Hải Nguyễn
 
EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1NetworKingStudy
 

Semelhante a Building Scalable Cisco Internetworks (Bsci) (20)

Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 
Eigrp new
Eigrp newEigrp new
Eigrp new
 
6978106.ppt
6978106.ppt6978106.ppt
6978106.ppt
 
EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)EIGRP (enhanced interior gateway routing protocol)
EIGRP (enhanced interior gateway routing protocol)
 
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configuration
 
Packet Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPFPacket Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPF
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Ospf
OspfOspf
Ospf
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopediaEnhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
Enhanced Interior Gateway Routing Protocol - Wikipedia, the free encyclopedia
 
Group 1
Group 1Group 1
Group 1
 
CCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrpCCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrp
 
EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1EIGRP interview questions and answers part 1
EIGRP interview questions and answers part 1
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 

Mais de CCNAResources

Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And SummarizationCCNAResources
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And SummarizationCCNAResources
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And AnswersCCNAResources
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 SwitchingCCNAResources
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip RoutingCCNAResources
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless ResourcesCCNAResources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANsCCNAResources
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)CCNAResources
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)CCNAResources
 

Mais de CCNAResources (16)

Iscw Cram Sheet
Iscw Cram SheetIscw Cram Sheet
Iscw Cram Sheet
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Subneting And Summarization
Subneting And  SummarizationSubneting And  Summarization
Subneting And Summarization
 
Subneting And Summarization
Subneting And SummarizationSubneting And Summarization
Subneting And Summarization
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Quick Guide VLANs
Quick Guide   VLANsQuick Guide   VLANs
Quick Guide VLANs
 
Quick Guide Layer 2 Switching
Quick Guide   Layer 2 SwitchingQuick Guide   Layer 2 Switching
Quick Guide Layer 2 Switching
 
Quick Guide Ip Routing
Quick Guide   Ip RoutingQuick Guide   Ip Routing
Quick Guide Ip Routing
 
Ccna Wireless Resources
Ccna Wireless ResourcesCcna Wireless Resources
Ccna Wireless Resources
 
Ccna Quick Notes –VLANs
Ccna Quick Notes –VLANsCcna Quick Notes –VLANs
Ccna Quick Notes –VLANs
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)Lab08 Rip Routing (Ccna4.Com)
Lab08 Rip Routing (Ccna4.Com)
 
Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)Lab09 Rip Routing (Ccna4.Com)
Lab09 Rip Routing (Ccna4.Com)
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Building Scalable Cisco Internetworks (Bsci)

  • 1. Building Scalable Cisco Internetworks (BSCI) 642-901 Study Guide Rob McCarty 12/12/07 Contents: Routing Protocols -EIGRP Pages 2-6 -OSPF Pages 7-11 -IS-IS Pages 12-15 -BGP Pages 16-x Advanced Routing Topics -Multicast Pages x-x -Route Manipulation Pages x-x -IPv6 Pages x-x -DHCP Services Pages x-x Before you read: This guide was created with the intention to help with the Cisco exam BSCI 642-901. This is just a quick reference, cram style study guide. It is not designed to teach the foundation topics required to pass the exam, rather a guide to help remember specific topics. I suggest reading the Cisco Press books associated with the exam before going through this guide, as well as getting as much hands on practice with the Cisco IOS if you want to be successful. This guide also assumes the reader has CCNA level knowledge to understand many of the terms used.
  • 2. Routing Protocols EIGRP Overview -Developed by Cisco, and will only work with Cisco devices -Considered a “Hybrid” between Link-state, and Distance vector routing protocols -Uses backup routes called a feasible successor -Uses the DUAL algorithm to calculate routes -Has 3 tables: Neighbor, Routing, and Topology. -Classless Routing, supports VLSM -Supports multiple routed protocols ex. IPX, Appletalk, IP Terminology Successor: The best route, or primary route, to a network. It has the lowest FD Feasible Successor: The backup route to a successor. Feasible Distance (FD): The total distance to the destination network, including the AD Advertised Distance (AD): The distance from the next-hop router, and the destination network Active Route: Route is undergoing computation, due to a change ex. Its down. Passive Route: Operational route Neighbor table: List of directly connected routers Routing table: The best routes to networks. List of successors and feasible successors Topology table: A list of neighbors' routing tables. DUAL: The algorithm that decides what routes to use Reliable transport protocol (RTP): Ensures EIGRP packets reliability EIGRP Metric The metric is the bases for how the Successor is chosen. The lower the metric, the better the path to that network is. It is a complex calculation that can be based on: Bandwidth – The speed of the line Delay – The time it takes for a packet to cross the line Reliability – Uptime of a line Loading – The load on the line MTU – Maximum Transmission Unit Although all of these can be configured, by default, only Bandwidth and Delay are used to calculate the metric. These options are referred to as K values in the IOS. *Note* If a metric option is configured on one router, but not another, they will NOT become neighbors
  • 3. EIGRP packets Hello: Creates relationship with neighbors Update: Update/send routing tables to neighbors Query: Queries for available routes/paths to networks Reply: Reply to a query ACK: The RTP response to ensure the packet was received. Used for everything BUT Hello packets. EIGRP Show Commands show ip eigrp neighbors: Displays the neighbor table -H (handle): Lists each neighbor in order of discovery -Address: The layer 3 address of the neighbor ex. IP address. -Interface: The int that the neighbor is connected through -Hold Time: The maximum time without hearing a Hello packet before this link is considered “dead”. The default is 15 seconds, or 3 hello packets. -Smooth Round Trip Timer (SRTT): The average time for the router to send a hello packet, and receive an ACK back. show ip eigrp topology: Displays routes with their associated successors and fiesable successors (if applicable), along with the FD to each. Also displayed here, are if any routes are in an active or passive state. show ip route: Displays the routing table, along with how each route has been learned. show ip eirgp interfaces: Displays specific information for each interface that is configured for EIGRP Peers: Number of directly connected neighbors Pacing Time: Used to determine when eigrp packets should be sent on this interface. Pending routes: Number of routers in the packets that are waiting to be sent show ip eigrp traffic: Displays the number of EIGRP packets that have been sent/recv. ex. The number of hello packets send/recv.
  • 4. Load Balancing By default, EIGRP will load balance across up to 4 equal paths to the same network. Paths are considered equal, when they have the exact same metric. You can however, load balance over multiple paths even if they do not have equal metrics. The command to do this is called variance, and is run from the EIGRP configuration prompt. ex. hostname<config-router>#variance 3 The number after the variance command is a value between 1-128, with 1 being default. This number defines how much of a variance there can be from the metric of the successor, by a multiple of what ever the number is. ex. a variance of 3 means that there can be up to 3 times the metric to still be used for load balancing. If the successor's metric is 500, then it will use any routes with up to 1500 as a metric as well. EIGRP Default Route A default route is a route that a router sends packets to, that it does not have a route for in its routing table for. ex. Addresses on the Internet. In the IOS is is referred to the gateway of last resort. Configure by setting a static route to 0.0.0.0 via 0.0.0.0 on the interface you want it to go out of. ex. ip route 0.0.0.0 0.0.0.0 eth0/0 If you then want to advertise this route to other routers to use via EIGRP, configure the network for it on the AS number you are using. ex. router eigrp 1 network 0.0.0.0 This would allow other routers use int eth0/0 on this router, as a default gateway. You can also configure a default route on an existing route by the ip default-network command. ex. ip default-network 192.168.0.1 This will set the current route to 192.168.0.1 as the gateway of last resort/default route. Route Summarization By default, EIGRP has the command auto-summary enabled. This causes the protocol to become classfull, and does not transmit the subnet masks along with routing updates (it assumes default masks). To turn off auto-summary so that you can use more specific and efficient summarization, simply enter the no auto-summary command from the EIGRP configuration prompt. You will then be able to configure specific summary routes. ex. ip summary-address eigrp 1 192.168.0.1 255.255.255.240
  • 5. EIGRP Authentication As a way to protect the network there is the option to have EIGRP communication authenticated. It uses MD5 hashing to encrypt a key-chain of keys which are used in the domain. Each key will have a “lifetime” on it, which is how long the route will use that key. This way you can set 1 key to expire, and have it automatically start using another afterwards. You can have the keys overlap, to ensure no problems between routers when changing keys. To configure: key chain Key_Chain1 where Key_Chain1 is whatever name you want to call the key chain. This takes you into the configuration of that key chain. key 1 where 1 is the number of whatever key you want to configure. key-string defines what the 'password' will be for this key There are now 2 commands to run, to set how often the keys will be used. accept-lifetime is the timeframe that this router will accept this key as valid send-lifetime is the timeframe that this router will use this key and send to others routers. These values are set by setting the time-to-start (hh:mm:ss, day, MONTH) and the duration, or a specific time to stop. Now to actually turn on authentication, you go into the interface configuration of whatever link you want to run it. You do not need to run authentication on every link. Under the interface type: ip authentication mode eigrp 1 md5 where 1 is the AS number Once it is on, you need to apply the key-chain to be used ip authentication key-chain eigrp 1 Key_Chain1 where 1 is the AS and Key_Chain1 is the name of the key chain. *note: If a router receives communication on a link from another EIGRP router and does not have the correct authentication, it is immediately taken out of the routing table. STUB Zones A stub is a router that does not go anywhere, meaning it is not asked about routes because it has already told its neighbors that it has nothing else. Although not unique to EIGRP, stubs help cut down on queries within a network. ex. A link goes down on a router that is also connected to 5 other routers. It will then query those 5 routers for a backup path, and if those routers do not have a route, will then pass the query on and on until it finds one, or it timesout. If those 5 routers were configured as stubs, the router that lost the link would not even ask them, as it already knows they are stubs and have no other routes. From the EIGRP configuration prompt, use the eigrp stub command, followed by what you want to advertise. ex. eigrp stub static. This would advertise all/only static routes.
  • 6. EIGRP Notes -224.0.0.10 is the multicast address that EIGRP uses. -Hello packets are NOT sent reliably, meaning there is no ACK message when they are received. -The metric calculation is ... -The administrative distance for Internal EIGRP is 90 and for External EIGRP 170 -A K-Value mismatch means the options being used to calculated the metric differs between connected routers, and they will not become neighbors because of it. -A graceful shutdown is when an interface shutdown (either administratively or due to a reload), EIGRP will send out a final hello message with k-values of 255 to tell other routers that is it being taken down. Also called a goodbye message.
  • 7. OSPF Overview -Link state protocol -Uses Dijkstra's SPF algorithm -Only sends routing updates when there are changes* -Very resource intensive compared to other protocols Terminology -Neighbor Table: List of directly connected routers -Routing Table: The current best routes to networks -Topology Table: A complete database of all possible routes in an area -Area Border Router (ABR): A router that connects 2 areas together, and knows about both topologies -Autonomous System Boundary Router (ASBR): Connects an area to a network, outside of your AS ex A network like the Internet. Also connects to a network running a different routing protcol. -Router ID (RID): an identifying name used by OSPF. -Internal Router: I router that has all interfaces in one area -Backbone Router: A router in the backbone area A. -NBMA: Non-Broadcast-Multi-Access. ex. Frame Relay Areas All areas must connect back to area 0, which is considered the backbone area. Because of this, on ABRs, one of the interfaces must ALWAYS be in area 0. The topology table is shared and is the same between all routers in an area. ABRs, will have routes from both areas. Router ID Based on the highest IP address that is active when OSPF starts on a router. However, a loopback interface will take priority over a physical, regardless of whether it is higher or not. ex. int e0/0 is 192.168.1.1 int e0/1 is 192.168.1.2 192.168.1.2 becomes the RID If you configured a loopback with the address of 1.1.1.1, then the RID would be 1.1.1.1 next time OSPF started. The command router-id, overrides all ip address and becomes the RID. ex. <config>#router-id 2.2.2.2
  • 8. Show Commands show ip ospf – Displays OSPF related information, including area types show ip ospf database – Displays details of LSAs show ip ospf neighbor – Displays Neighbor table show ip route – Displays routing table When looking at the routing table, OSPF routes have 4 different tags O – an intra-area route learned by OSPF O IA – an inter-area router learned by OSPF E1 – An external route. E2 – An external route. The difference between E1 and E2, is that E1 is the combined costs of all hops to get to that external router, whereas E2 is just the cost the ASBR gave that route, regardless of the cost to get to that ASBR. This is the default and should be left as unless there are multiple ASBRs to get to an external network. Summarization Route summarization can only be done on an ABR between areas, thus careful planning needs to be done to ensure IP address contiguousness. Route Summarization blocks specific route LSAs from entering the backbone and propagating to all areas. Two types of summarization can be done: Interarea route summarization – When an ABR summarizes routes in an area External router summarization – Summarizations of routers injected in OSPF via redistribution. Usually done on ASBRs. To configure interarea summarization from the OSPF configuration: area 1 range 10.1.2.0 255.255.255.0 100, where 1 is the area ID, and 100 is the cost (optional) To configure external summarization on an ASBR from the OSPF configuration: summary-address 10.1.2.0 255.255.255.0 word, where word is a tag (optional) for us with route-maps.
  • 9. Neighbor Communication and Packet types Hello packets – Sent to all routers on the area. Contains neighbor table. Database description (DBD) – Brief description of the topology, used to communicate what routes have been learned. Link-state request (LSR) – A request for an LSA of a route Link-state update (LSU) – Packet that contains the LSA(s). Link-state advertisement (LSA) - -Type 1/Router LSA -A route that is flooded to all routers in an area -Type 2/Network LSA -Advertises a network in an area -Type 3/Summary LSA -Routers to another area. Type 1 LSAs and turned in Type 3 by ABRs -Type 4/Summery LSA -Like type 3, but involve ASBRs -Type 5/External LSA -An advertisement of another AS by an ASBR -Type 7 -Use in NSSA to pass LSAs from external networks Link-state acknowledgment (LSACK) – Acknowledgment message that ensures reliability of updates Neighbor process OSPF Metric/Costs OSPF makes its routing decisions based on the cost of routes. The lower the cost, the better, or faster, the route. Cost = 100 / Bandwidth in Mbps ex. FE 100Mbs = 1 Ethernet 10Mbps = 10 T1 1.544 = 65 56k = 1785 However, by default, because there cannot be a fraction of a cost, anything over 100mbps, would also get a cost of 1, no matter the speed. There are two ways to change the default costs. First, you can just manually specify what you want the cost to be. To do this, use the command ip ospf cost on an interface Or, you can change how the cost is calculated so that it adjusts to the bandwidth more accurately. Under the OSPF configuration, use auto-cost reference-bandwidth 100 , where 100 is the metric you want to use in Mbs (100 being default)
  • 10. DRs and BDRs Anytime there is a shared segment, there will be a DR and a BDR. P2P connections however, do not elect or need this. All other routers on the segment, will be tagged as DR-Other All updates that are needed to be sent out on that segment, will be sent out by the DR. The DR and BDR are elected based on the router priority that is sent in the hello packet. Since by default all the router priorities are set to 1, the tie break is the higher RID. You can change the router priority, to ensure a router becomes a DR or BDR, use the command router- priority ex. <config>#router-priority 2. If all other routers were left as 1, this would become the DR. You can set the priority to 0 if you would like to disable the router from ever becoming DR/BDR Authentication Two types of authentication are supported in OSPF. Simple password (plain text), and MD5 authentication. Passwords are inserted into the header of OSPF packets, and neighbors must share the same passwords on the interface in which they are connected. To configure authentication from the interface config: ip ospf authentication-key word, where word is the password you want to use, or for an MD5 key, use ip ospf message-digest-key 100 md5 word, where 100 is the key-id, and word is the password. ip ospf authentication for simple password, or ip ospf authentication message-digest for MD5 encryption of the password. Default Route OSPF routers do not, by default, generate a default route. To configure: default-information originate always. If there is already a default-route in the routing table, this will tell this router to advertise it to others. If there is not already a default-route, the always (optional) option at the end forces it to advertise the 0.0.0.0 anyway. NBMA Types and Configurations Broadcast, multi-access networks: Ex. Ethernet. Single operation mode. Uses DR/BDR and 10 second hello intervals Point-to-Point networks: Ex. ISDN Single operation mode. No DR/BDR and 10 second hello intervals. Non-Broadcast, Multi-Access (NBMA) networks: Ex. Frame Relay Five operation modes.
  • 11. Virtual Links and Configurations Virtual links are used to connect areas to the backbone, through other areas, without actually sharing an ABR with area 0. You can also use it to connect discontinuous area 0s in an AS. However, this should only be considered a temporary solution, and not part of the design. To configure: area 1 virtual-link 2.2.2.2, where 2.2.2.2 is the router ID of the remote router you want to neighbor with. Stub, Totally Stubby Areas and Not-So-Stubby-Areas Stub area – The ABR does not forward external routes into this area. In routers need to reach external networks, they use default routes. Totally Stubby area – This area does not accept external routes, or summary routers from other areas. NSSA – A stub area that allows routes to still come in under LSA type 7. This areas can also have ASBRs. Stub and Totally stub areas should have only 1 exit, or only 1 default route to exit. All routers within an area must be configured as stub routers before they will become neighbors. To configure stub areas, ####### Notes *updates are still sent every 30mins to neighbors, to ensure convergence. LSAs on virtual links do not age, and will not be refreshed every 30mins
  • 12. IS-IS Overview -A router is referred to as an intermediate system, or an IS. -Is a Link-State Routing protocol -Uses SPF algorithm -Originally created to be used with the OSI protocol -Integrated IS-IS was created to support TCP/IP -Integrated IS-IS still requires and OSI address, which is now called a CLNS, which acts as the layer 3 protocol for IS-IS. Terminology Connectionless Network Services (CLNS): The OSI address used by IS-IS L1 Router: Only knows of networks in their own area L2 Router: Only knows of routes on the backbone. Network Service Access Points (NSAP): The CLNS address that is applied to a router. NSAP Selector (NSEL): When this is set to 0, the SNAP is called a NET Network Entity Title (NET): Used to identify an OSI host in a domain PDU LSP IS-IS Routing There are 3 types of routers. L1, L1/L2, and L2. Areas connect to each other via links instead of ABRs. However, L2 routers must be contiguous throughout the network, and have a physical path through each area. Because IS-IS runs through CLNS, it is less resource intensive than OSPF. Fewer updates are sent, and there are much fewer update types to be sent. Metrics The default on all connections, is a metric of 10, regardless of the connection type or speed. To make IS-IS more efficient, you can configure the metric on a link: isis metric 30 level-2, where 30 is the new metric value, and level-2 is the interface types to apply to. The metric can be set to anything from 1 to 63
  • 13. CLNS addresses Unlike IP, CLNS can apply to an entire router, as opposed to a specific interface. IS-IS requires CLNS addressing on all nodes for them to discover each other. CLNS addresses that are used by routers are call NSAPs. NSAP addresses contain the OSI address, and a link to the higher-layer process. It is the equivalent of the IP address and TCP. The NSAP address is broken down into 3 parts; the area address, the system ID (6 bytes), and the NSEL (1 byte), with a maximum of 20 bytes total. The first part of an NSAP address is AFI. If this is set to 49, it means that the address is for internal use (private). An example of an address: 49.0004.0000.0c4b.7b3c.00, where 49 is to specify its private, 0004 is the area ID, system ID is the MAC address, and the NSEL set to 0, making it a NET address.. The area address is associated with the IS-IS routing process. All routers in an area must be set the same, and is what defines an area, and is what is used in L2 routing. L1 routers only see routers with the same area address. The system ID must be unique within an area. Usually use the MAC address, but anything 6-bytes long is possible. L1 routing is based on this ID, and must be unique. Route leaking Because L2 and L1 computations are separate, it is possible to have asymmetric routing. Meaning the path a packet takes to reach a destination, may take a different path on the way back, due to L2 and L1 routers seeing different paths to take. Route leaking is like redistribution, where the L2 routers share some interarea routes with L1 routers. IS-IS packets OSI recognizes a frame as a data-link PDU, and a packet as a network PDU. The 4 other types of PDUs are: Hello PDU (ESH, ISH, IIH) – use to establish and maintain adjacencies. LSP – Used to distribute link-state information PSNP – Used to ACK or request missing link-state information CSNP – Used to describe an entire LSDB L1 and L2 information is distributed in separate LSPs. LSPs in a broadcast network are sent out as multicast, and as unicast on P-t-P networks. The default interval on Hello packets (IIH) is 10 seconds. The dead timer is still 3 times the hello timers
  • 14. Network types IS-IS only works in with broadcast networks, or Point to Point. It does not know about NBMA networks, and it is recommended to use point-to-point over NBMA clouds. IS-IS assumes that LANs and WANs are in a full mesh state, and broadcasting can be achieved. LSDB synchronization When an LSP is received, it is then flooded to all neighbors except the one it came from. L1 LSPs in their local areas, and L2 LSPs through the backbone. A sequence number is used to ensure only current updates are listened to. Adjacent routers exchange CSNPs to compare their LSDB, and are used to determine whether their LSDBs are synchronized. PSNPs are used to acknowledge receipt of LSPs and to request anything missing. Configuring IS-IS To enable IS-IS on a router: router isis 10, where 10 is the area-tag. The area-tag is not like an area ID from OSPF, rather it is more like the process-id. If it is omitted, the IOS assumes 0 in its place. To set a NET for a router once IS-IS has been enabled: net 49.0004.0000.0a2c.93bc.00 To set the router type: is-type level-1 or level-1-2 or level-2-only. It not set, the default is a L1/L2 router. Once you have set these two things, you then need to go into the interface you want IP routing: ip router isis 10, where 10 is the area-tag. To change the router type on a per-interface basis: isis circuit-type level-1 or level-1-2 or level-2-only. Show commands show clns – displays general info about CLNS network show clns 10 protocol – specific info on an area, where 10 is the area tag. show isis 10 route - displays L1 routing table, where 10 is the area tag. show clns route – displays L2 routing table show isis 10 database – displays the LSDB show isis 10 topology – displays L1 and L2 topology tables
  • 15. Summarization To configure route summarization from the router config: summary-address 192.168.1.2 255.255.255.0 level-1-2
  • 16. BGP Overview A routing protocol designed for the internet to connected AS. An InterDomain Routing Protocol (IDRP). The routing table on a core internet BGP router can be more than 200,000 routes. Considered a 'path vector' type of protocol Because BGP is so scalable, it has very slow convergence time. Uses TCP for reliability Terminology Interior Gateway Protocol (IGP): External Gateway Protocol (EGP): Autonomous System (AS): External BGP: When BGP is running between routers in different AS Internal BGP: When BGP is running between routers in the same AS Peer Group: A group of neighbors configured to have the same update policies. Multihoming Multihoming is when an AS has more than one connection to the Internet. This could be for reliability, or for performance reasons. BGP helps in preventing routing loops, as well as being able to configure which links to use, and when. There are 3 ways to accomplish this -Each ISP passes only a default route to the internal routers. Path manipulation cannot be done by the AS, as the ISP controls what default route is used. -Eash ISP passes only a default route and ISP specific routes This allows more optimal routing decisions to be made, and allow routers to router through better paths (if they exist) to specific networks. -Each ISP passes all routes to the AS Although resource intensive, this all allows the best routes to be chosen to any network. BGP synchronization BGP synchronization is disabled by default. With synchronization on, BGP routers in a transit path do not use or advertise routers to external AS, thus it is unnecessary to turn it on. Redistribution from BGP into an IGP is not scalable due to the size of some BGP tables, thus most networks will run full- mesh IBGP networks.
  • 17. Packet types Once TCP is established between 2 peers, each side sends an open message. A keepalive is sent in reply if the open is acceptable. Once this has happened, updates and notifications can be exchanged. Open message - Includes the version of BGP running, AS number, hold time, BGP router ID (which is chosen the same way as OSPF), and any optional options. Keepalives – A simple message header to keep the hold timer from expiring. Updates – Updates only one path at a time. May also include withdrawn routes, path attributes, and a list of IP address prefixes that can be reached by this route. Notifications – Sent when BGP routers detect an error on a route. Neighbors Also known as peers. BGP routers do not form relationships with all routers, rather a select few in which it exchanges updates with. Peers can be either internal, or external of the AS. Peers are configured manual, and do no discover each other automatically. There are 6 states for a neighbor to be in: Idle Connect Active Open Sent Open Confirm Established Only when routers are in an established state, will updates, keepalives and notification messages exchanged. Attributes Attributes are what the routing decisions are based on, like a metric. An attribute can be: well-known mandatory -AS-path, type code 2. A list of AS numbers that a route has traversed through. -Next hop, type code 3 The next hop IP address to get to a destination. -Origin, type code 1 Describes where the route came from. Can be one of 3 options: IGP, EGP, or incomplete(unknown)
  • 18. well-known discretionary -Local preference, type code 5 Indicates which path is preferred to exit an AS. -Atomic aggregate type code 6 optional transitive (partial) -Aggregator type code 7 -Community, type code 8 A way of tagging routes for filtering/maps optional non-transitive -Multiexit-discriminator (MED), type code 4 Also called the metric, indicated to external neighbors the preferred path into the AS Well-known – all BGP implementations must recognizes and propagate. Mandatory must appear in updates, and discretionary does not. Optional – BGP routers might propagate the attributes. Transitive routers will pass the attributes on as partial, and non-transitive will delete the attribute. Weight – A cisco specific attribute that applies only to the local router. Routes with a higher weight are preferred. Route Selection Multiple paths may exist to a network, and they are all kept in the BGP table. However, BGP select only one path to get to a network, which goes into the routing table. The decision is based on the attributes set. BGP does not consider routers with AS loops, or unreachable next-hops. Configuration of BGP To enable BGP on a router, use router bgp 65100, where 65100 is the AS. You can only have 1 AS on a router. To activate a session with a BGP neighbor use: neighbor 192.168.0.2 remote-as 65101, where the IP is the address of the neighbor To create a peer group, use the command neighbor group1 peer-group, where group1 is the name of the group. neighbor 192.168.0.2 peer-group group1, with the IP address of the neighbor to add to a group To use a loopback address when configuring a neighbor, use update-source option: neighbor 1.1.1.1 update-source loopback 1, where 1 is the interface-number
  • 19.
  • 20. IP Multicast Overview Networks can be more efficient by sending the same information once, to multiple nodes Use Class D addresses Most applications will use UDP Terminology IGMP CGMP PIM RP RPF Multicast IP and MAC addresses Multicast addresses are in the class D range, 224.0.0.0 to 239.255.255.255. Some common local scope IP addresses reserved by IANA 224.0.0.1 – All hosts 224.0.0.2 – Al multicast routers 224.0.0.5 – All OSPF routers 224.0.0.6 – OSPF DRs. 224.0.0.9 – RIPv2 routers 224.0.0.10 – All EIGRP routers In layer 2 environments, the IANA has reserved a block of MAC addresses starting with 01:00:5E to be marked as multicasts. IGMP Used between hosts and their local router to join multicast groups, so that the router knows to forward multicasts to the them. IGMP snooping is a way to prevent multicast flooding on layer 2 switches, since they cannot see the IP address of hosts that have joined the multicast.
  • 21. The current version is IGMPv3. It allows for hosts to request access to multicast sessions, as well as send out leave-group messages to stop the router from sending the session. V3 also adds the ability to filter multicasts based on the source so that hosts can have control over what is received. By default, layer 2 switches flood IGMP groups. One solution is to manually add multicast mac addresses, but this is not scalable. IGMP snooping is a way for switches to listen to all IGMP packets, and update their tables respectively, essentially becoming Layer 3 aware. This can be resource intensive. CGMP Cisco proprietary protocol that runs between a router and a switch. When a host joins IGMP group, the router creates a CGMP packet with the mac address of the client that requested for the switch, so that the switch can forward the traffic appropriately. The multicast mac address that the switches listens on is 0x0100.0cdd.dddd. PIM routing PIM is independent of the routing protocol and uses its own routing table, but gets its information for it via the unicast routing protocol running. Multi-cast routers use PIM to dynamically creates distribution trees to determine the path of multicast traffic. There are 2 types of these trees. Source Tree – Direct paths to each multcicast group from the source. Shared Tree – A single tree shared by all routers. I has a single common root called an RP which all sources forward to. Multicast routing also uses Reverse Path Forwarding, which does not send a packet to a receiver, but instead sends the packet away from the source. There are 2 modes that PIM can be in: Sparse mode (PIM-SM) – Uses a 'pull' model to send traffic. Uses the shared tree. Sources register with the RP Dense mode (PIM-DM) – Uses a 'push' model to flood traffic. Uses the source tree. Routers that do not want the multicasts, send requests to the source to prune them from the tree. There can also be the option of PIM sparse-dense mode that is a hybrid of the two, that allows for both groups concurrently. Cisco recommends this option to always be used.
  • 22. Configuration To enable multicast routing on a router, use ip multicast-routing command To enable a mode, from an interface: ip pim sparse-mode or ip pim-sparse-dense mode. To set the router to be the RP: ip pim send-rp-announce ethernet 0/1 scope 3 group-list 101, where ethernet 0/1 is the interface to run on, 3 is the TTL maximum hops to announce to, and 101 is the access-list of hosts to send to. The announcements are sent on the 224.0.1.39 address. To manually listen on interface to a multicast group: ip igmp join-group 224.0.0.55, with the IP of the group to listen on. To join an interface to a group so that it automatically forwards those packets: ip igmp static-group 224.0.0.55 Show commands show ip mroute – displays the IP multicast routing table show ip pim interface – displays information about routers configured for PIM show ip pim neighbor – displays discovered PIM neighbors show ip pim rp – displays RP information show ip rpf – displays RPF information for the RP show ip igmp interface – displays multicast information for that interface show ip igmp groups – displays the multicast groups this router is part of
  • 23. IPv6 Overview -A new form of Internet Protocol, designed to replace IPv4 (current) -No broadcasting/boardcast address -IPsec standard on all communication -around 300,000,000,000,000,000,000,000,000,000,000,000,000 available addresses Formatting IPv6 addresses are 128bits long. The are broken up into 8 groups, of 4 hex characters each. ex. 2001:0002:0349:0000:0000:0000:0A56B:98AA To make them shorter, and more manageable, two things are allowed. First, any groups of consecutive zeros, can be dropped once, and replaced with :: ex: 2001:0002:0349::0A56B:98AA Second, any leading zeros on any groups, can be omitted ex: 2001:2:349::A56B:98AA Types of Communications Unicast: Same as IPv4, sent to one host. Multicast: Sent to many hosts listening to a multicast address, and replaces broadcasts. Anycast: Sent to the closest host All devices will usually have more than one IP address. The types of addresses are : Link-Local: Layer 2 domain. ex. Like a local segment This address is assigned automatically without DHCP, a lot like the 169.254.x.x address in IPv4. It is used to locally communicate with other devices on the segment, without needing a DHCP or assigned addresses. Every device will always at least have this.
  • 24. All link-local address will start with FE80. The first 10 bits, will always be 1111 1110 10, followed by 54 bits of zeros. This way you can look at an address, and know right away that it is link local The last 64 bits of the address, will be the MAC address of the device, with FFFE in the middle. ex. If the mac address was 0012:21D5:012E, the link-local address will be FE80:0000:0000:0000:0012:21FF:FED5:012E or FE80::12:21FF:FED5:12E short-formed. Unique: Organization wide addressing Used within an organization to define network boundaries, or domains. They can be compared to the private IP addressing of IPv4 (10.x.x.x, 172.16.x.x etc) The first 8 bits in a Unique address, are 1111 1101, which equals FD. The next 40 bits represent your global ID, which is your organization's ID. This is unique per organization, and is assigned to all devices within. The next 16 bits will be the subnet ID The last 64 bits will be the interface ID. This can be manually assigned, or automatically by a DHCP Global: Internet address This will be the address that lets you route on the Internet. You can still use a NAT with a unique address internally, but Internet routers will route by the Global address. The first 3 bits must be set to 001, making all addresses start with 2. The next 45 bits or less, will comprise the Global Routing Prefix. The internet is expected to use addresses starting with 2001:: The next 64 bits (less what ever the global used), will be the subnet ID, to narrow down the location of the route. The last 64 bits, will be the interface address. Multicast Addresses First 8 bits are set to 1111 1111, which means they start with FF The next 4 bits, are called the FLAG. This is used to set some basic options, like whether the address is permanent (RFC defined) or temporary (something you create). The next 4 bits define the scope. This specifies how far this multicast goes. The options are
  • 25. 1 – Interface (loopback) 2 – Link 3 - Subnet 4 - Admin 5 - Site 8 - Organization E – Global (internet) The last 112 bits are the address. This can be set to whatever you want, as long as they are not already assigned to something else. Some of the already assigned addresses are as follows: FF02::1 - All nodes on the link (pretty much a broadcast) FF02::2 - All routers on the link FF02::9 - All RIP routers on the link FF05::101 - All NTP servers in the site FF02::1:FFxx:xxxx - “arp” msg to all nodes on the link, where the last 6 digits match the x's. ex. FF02::1:FF00:28FD would be a way to find the layer 2 address of a system that ends in 00:28FD.
  • 26. DHCP Services Overview Used to provide clients with IP addresses dynamically Terminology bootp DHCP binding Configuration DHCP service and relay agent are enabled by default. To turn them on use service dhcp command To specify a database to store DHCP bindings: ip dhcp database server1 To disable conflict logging no ip dhcp conflict logging To specify an exclude list ip dhcp exclude-address 192.168.0.1 192.168.0.10 To create the DHCP pool to be used and enter specific DHCP config: ip dhcp pool mypool To specify the range to be used network 192.168.1.0 255.255.255.0 dns-server 192.168.0.2 /24 to specify DNS default-router 192.168.0.1 /24 to specify a gateway Relay agent A relay agent relays DHCP requests across domains. Because DHCP requests are broadcasts, this needs to be on in order to reach a DHCP server through a router. In order for a relay agent to work, the ip helper-address needs to be assigned to an interface. This changes the broadcasts into a unicasts and forwards them to the correct server.
  • 27. Show commands show ip dhcp database – displays recent activity in the database show ip dhcp binding – displays a list of bindings show ip dhcp conflict – displays any address conflicts clear ip dhcp binding – clears bindings